Listen to your users and build a great UC solution
Bring Your Own Device (BYOD) brings some obvious challenges in terms of budgeting and co-ordinating the devices that employees want to use. However, the real challenges of BYOD are the less obvious ones.
If your staff can choose their own software and “apps”, and download them in minutes to their own cool device, how do you ensure that everyone uses the business software applications that have been purchased for use throughout the company? The challenge is that the employee can get access to any software they choose, almost instantly, while the business needs to undertake a formal evaluation and procurement process which can take a few months.
For example, an employee might choose to use Skype, which was only intended for personal use, while the business might decide to invest in Avaya Flare for conferencing. The other concern is how to prevent unauthorised software from entering your corporate network? Not only is there a risk from inconsistency across the software running on the corporate network, the kind of viruses and Trojans that spread through popular consumer websites and gaming software can potentially damage the network as well.
This is a classic “Unified Communications” challenge – and Unified Communications can also provide some pointers to the best approach. Surprisingly maybe, the answers don’t lie with the technology and the formal Unified Communications solution. Keeping your network working correctly, secure and free from unauthorised software depends primarily on how you involve your people.
The focus for your “BYOD” strategy should start with your staff. It is all about the user experience – if people are included in the planning and choice of technology, they will naturally feel more motivated to use the system. At Connect, we advocate an approach that revolves around understanding what is required from the point of view of the employees who are going to use the system. A successful UC adoption begins with a focus on the user experience and successful implementations will make this a major part of the adoption strategy.